问题

在世界历史的浩瀚星空中,有很多的历史人物,因其所做出的重要贡献而成为这星空中耀眼的明星,铭记史册。观察下列图片中的人物,回答问题。

图一:日本天皇
图二:安拉的使者

(1)图一是七世纪的日本天皇,请你说出与他相关的日本的一项重大改革。并说出此改革在日本历史上所起到的重大作用。____________________________________________________________________________________________(2)图二中的人物是谁?请你以大事年表的方式来总结此人一生的重要贡献。(至少涉及到三件大事)____________________________________________________________________________________________(3)两幅图片中的历史人物所在的国家和地区,走向封建化的方式有所不同,请你结合史实来说明他们各自的特点。____________________________________________________________________________________________

答案

(1)图一为日本天皇孝德天皇,在他的领导下日本进行了大化改新。使日本由奴隶社会过渡到封建社会。

(2)图二是穆罕默德。大事年表如下:

7世纪初,创立了伊斯兰教;

622年,率信徒潜行到麦地那,在那里建立了政教合一的国家;

630年,率军兵临麦加城下,迫使麦加贵族皈依伊斯兰教。

632年,去世,但阿拉伯半岛已基本统一。

(3)日本是通过改革的方式,效仿中国隋唐时期的封建制度,从而走向封建社会的。阿拉伯国家则是通过宗教的方式,建立政教合一的国家,来确立封建制度的。

单项选择题 A1/A2型题
单项选择题

Public Key Infrastructure (PKI) service providers offer organizations fully integrated PKI-managed services designed to secure Intranet, Extranet, Virtual Private Network (VPN), and e-commerce applications. PKI solutions can enable a number of security services, including p authentication and non-repudiation of transactions.
eToken enables the users of PKI systems to generate and store (101) and digital certificates inside the token, creating a secure environment and allowing full portability and maximum ease of use. eToken Pro can also perform sensitive on-chip (102) operations, ensuring that users’ keys axe never exposed to the PC environment, eToken eliminates the need to store (103) and keys on a hard disk or browser file, or to transmit them across the Internet/Extranet; assuring peace-of-mind and confidence during online communications.
A digital signature is created using the private key of an individual to ensure the Validity of his request. This technology can be used to guarantee (104) of various transactions. The strength of either the authentication level or the digital signature relies on the level of protection offered to the private key. eToken Pro offers the maximum level of security, since it enables the use of the private key for signing and authenticating inside the eToken.
The most secure use of authentication involves enclosing at least one certificate with every signed message. The message (105) verifies the certificate using the CA’s public key. If the sender’s public key is legitimate, the recipient verifies the message’s signature. Digital signatures created with a private key are verified with the digital certificate containing the public key.

A.private keys

B.public keys

C.authentication codes

D.message digests